Ivy Bridge.
3930k is sandy bridge E
Please remember that any mention of competitors, hinting at competitors or offering to provide details of competitors will result in an account suspension. The full rules can be found under the 'Terms and Rules' link in the bottom right corner of your screen. Just don't mention competitors in any way, shape or form and you'll be OK.
Ivy Bridge.
As per this document, new microcode updates are available for Sandy Bridge onwards right now. Whether your motherboard manufacturer has released a new BIOS version with the updated microcode is another matter.I haven’t used my pc/s for months, few days back I updated windows 10 to the fall creators update1709 or whatever it is).
Have updated the bios on the 4770k motherboard(asus maximus vi formula) and the chipset from the asus website. All the drivers on their website is 2+ years old, nothing about the meltdown update tho they have for the gen 6-gen 8. Not looked on the ASRock website for the 2500k motherboard(ASRock Extreme 7 gen 3) for the bios etc.
Do you need to update/install something for the 2500k and 4770k for meltdown/spectre and if so how? As reading around I’ve only seen updates for gen 6-8 not earlier.
Just seen that Ryzens ****** as well now.
Haha.AMDflaws.com said:Although we have a good faith belief in our analysis and believe it to be objective and unbiased, you are advised that we may have, either directly or indirectly, an economic interest in the performance of the securities of the companies whose products are the subject of our reports. Any other organizations named in this website have not confirmed the accuracy or determined the adequacy of its contents.
(I wish both companies ditched their approach regarding this aspect of their platforms).
You mean cts labs which was founded in 2017 around the time just after spectre and meltdown came in and intel seemed to get most bad press?Just seen that Ryzens ****** as well now.
Just seen that Ryzens ****** as well now.
Does this mean I should be looking to update my BIOS ? I'm running on a 2700kAs per this document, new microcode updates are available for Sandy Bridge onwards right now. Whether your motherboard manufacturer has released a new BIOS version with the updated microcode is another matter.
If there's one available, sure. Otherwise you can hope that someone provides the microcode updates in a form that you can inject into the most recent BIOS version for your motherboard yourself (I did this last year with my Asus P6T Deluxe V2, updating the microcode version from 1C to 1D). Usually people do this by extracting the microcode update from another motherboard's BIOS update. In the case of Westmere-EP, Sandy Bridge, and Ivy Bridge, this likely means from a server motherboard's BIOS since it's very unlikely for such old consumer motherboards to get updates.Does this mean I should be looking to update my BIOS ? I'm running on a 2700k
I had a look at my manufacturers support page but nothing with regards to new update.If there's one available, sure. Otherwise you can hope that someone provides the microcode updates in a form that you can inject into the most recent BIOS version for your motherboard yourself (I did this last year with my Asus P6T Deluxe V2, updating the microcode version from 1C to 1D). Usually people do this by extracting the microcode update from another motherboard's BIOS update. In the case of Westmere-EP, Sandy Bridge, and Ivy Bridge, this likely means from a server motherboard's BIOS since it's very unlikely for such old consumer motherboards to get updates.
DIY to the rescue!I had a look at my manufacturers support page but nothing with regards to new update.
Like you say, highly unlikely it will get one either.
Is it worth the trouble ? I'm thinking of upgrading in the summer anyway.DIY to the rescue!
Is it worth the trouble ? I'm thinking of upgrading in the summer anyway.
Thanks for the clarification.Depends on your usage - for gaming and average desktop stuff not really though it does simplify things security wise - just make sure you are using a browser that has patched to block these exploits. Once software is already running on your system anyhow all bets are off.
If you are doing stuff with VMs though or where multiple users can log in that is another matter. (Though if you are running malware for testing even in a sandboxed environment its a good idea these days to use a disposable, air gapped, machine for that).